ID

VAR-202506-0023


CVE

CVE-2025-5492


TITLE

D-Link Systems, Inc.  of  DI-500WF-WT  Injection Vulnerability in Firmware

Trust: 0.8

sources: JVNDB: JVNDB-2025-010280

DESCRIPTION

A vulnerability has been found in D-Link DI-500WF-WT up to 20250511 and classified as critical. Affected by this vulnerability is the function sub_456DE8 of the file /msp_info.htm?flag=cmd of the component /usr/sbin/jhttpd. The manipulation of the argument cmd leads to command injection. The attack can be launched remotely. D-Link Systems, Inc. of DI-500WF-WT The firmware contains injection and command injection vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DI-500WF-WT is a wireless network coverage device produced by D-Link of China. D-Link DI-500WF-WT has a command injection vulnerability, which is caused by the failure of the cmd parameter to properly filter special characters and commands in constructing commands. No detailed vulnerability details are currently available

Trust: 2.16

sources: NVD: CVE-2025-5492 // JVNDB: JVNDB-2025-010280 // CNVD: CNVD-2025-12347

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-12347

AFFECTED PRODUCTS

vendor:dlinkmodel:di-500wf-wtscope:lteversion:20250511

Trust: 1.0

vendor:d linkmodel:di-500wf-wtscope: - version: -

Trust: 0.8

vendor:d linkmodel:di-500wf-wtscope:lteversion:di-500wf-wt firmware 20250511 and earlier

Trust: 0.8

vendor:d linkmodel:di-500wf-wtscope:eqversion: -

Trust: 0.8

vendor:d linkmodel:di-500wf-wtscope:lteversion:<=20250511

Trust: 0.6

sources: CNVD: CNVD-2025-12347 // JVNDB: JVNDB-2025-010280 // NVD: CVE-2025-5492

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2025-5492
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2025-5492
value: HIGH

Trust: 1.0

OTHER: JVNDB-2025-010280
value: HIGH

Trust: 0.8

CNVD: CNVD-2025-12347
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2025-5492
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2025-010280
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-12347
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2025-5492
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2025-5492
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2025-010280
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-12347 // JVNDB: JVNDB-2025-010280 // NVD: CVE-2025-5492 // NVD: CVE-2025-5492

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:CWE-74

Trust: 1.0

problemtype:injection (CWE-74) [ others ]

Trust: 0.8

problemtype: Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2025-010280 // NVD: CVE-2025-5492

EXTERNAL IDS

db:NVDid:CVE-2025-5492

Trust: 3.2

db:VULDBid:310909

Trust: 1.8

db:JVNDBid:JVNDB-2025-010280

Trust: 0.8

db:CNVDid:CNVD-2025-12347

Trust: 0.6

sources: CNVD: CNVD-2025-12347 // JVNDB: JVNDB-2025-010280 // NVD: CVE-2025-5492

REFERENCES

url:https://vuldb.com/?id.310909

Trust: 1.8

url:https://vuldb.com/?submit.575244

Trust: 1.8

url:https://www.dlink.com/

Trust: 1.8

url:https://vuldb.com/?ctiid.310909

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2025-5492

Trust: 0.8

sources: CNVD: CNVD-2025-12347 // JVNDB: JVNDB-2025-010280 // NVD: CVE-2025-5492

SOURCES

db:CNVDid:CNVD-2025-12347
db:JVNDBid:JVNDB-2025-010280
db:NVDid:CVE-2025-5492

LAST UPDATE DATE

2025-08-02T23:07:44.270000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-12347date:2025-06-13T00:00:00
db:JVNDBid:JVNDB-2025-010280date:2025-07-30T09:05:00
db:NVDid:CVE-2025-5492date:2025-07-15T17:22:55.370

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-12347date:2025-06-13T00:00:00
db:JVNDBid:JVNDB-2025-010280date:2025-07-30T00:00:00
db:NVDid:CVE-2025-5492date:2025-06-03T11:15:21.023